US8169633B2 - Method and apparatus for attempted secure print job release notification - Google Patents

Method and apparatus for attempted secure print job release notification Download PDF

Info

Publication number
US8169633B2
US8169633B2 US12/207,090 US20709008A US8169633B2 US 8169633 B2 US8169633 B2 US 8169633B2 US 20709008 A US20709008 A US 20709008A US 8169633 B2 US8169633 B2 US 8169633B2
Authority
US
United States
Prior art keywords
user
secure print
print job
image production
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/207,090
Other versions
US20100007907A1 (en
Inventor
Andrew J. Aikens
Zhun Huang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xerox Corp
Original Assignee
Xerox Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/168,998 external-priority patent/US20100007909A1/en
Application filed by Xerox Corp filed Critical Xerox Corp
Priority to US12/207,090 priority Critical patent/US8169633B2/en
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AIKENS, ANDREW J., HUANG, Zhun
Publication of US20100007907A1 publication Critical patent/US20100007907A1/en
Application granted granted Critical
Publication of US8169633B2 publication Critical patent/US8169633B2/en
Assigned to CITIBANK, N.A., AS AGENT reassignment CITIBANK, N.A., AS AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XEROX CORPORATION
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION RELEASE OF SECURITY INTEREST IN PATENTS AT R/F 062740/0214 Assignors: CITIBANK, N.A., AS AGENT
Assigned to CITIBANK, N.A., AS COLLATERAL AGENT reassignment CITIBANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XEROX CORPORATION
Assigned to JEFFERIES FINANCE LLC, AS COLLATERAL AGENT reassignment JEFFERIES FINANCE LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XEROX CORPORATION
Assigned to CITIBANK, N.A., AS COLLATERAL AGENT reassignment CITIBANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XEROX CORPORATION
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT RF 064760/0389 Assignors: CITIBANK, N.A., AS COLLATERAL AGENT
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1207Improving or facilitating administration, e.g. print management resulting in the user being informed about print result after a job submission

Definitions

  • Disclosed herein are a method and apparatus for attempted secure print job release notification from an image production device.
  • the secure print feature may allow users to protect a confidential document that they may not want others to view or take, by requiring the user to be at the image production device when the print job prints out. In most cases, the user selects this function, and then walks to the device to release the job. However, some users may leave the print job on the device for an extended period of time (e.g., forget about the print job, send it to the wrong printer, etc.).
  • the print job will stay resident on the image production device until it is either released or deleted by the authorized user at the image production device user interface or manually deleted by a system administrator.
  • the issue with this implementation is that the user does not control or receive any notification of any attempts to release or delete their secure print job(s) while he or she is not present at the image production device. This issue may pose a security risk depending upon the security policies of the organization.
  • a method and apparatus for notifying a user of an attempted secure print job release from an image production device may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
  • FIG. 1 is an exemplary diagram of an image production environment in accordance with one possible embodiment of the disclosure
  • FIG. 2 is an exemplary block diagram of an image production device in accordance with one possible embodiment of the disclosure
  • FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure.
  • FIGS. 4A and 4B are diagrams of exemplary secure print job user interfaces in accordance with one possible embodiment of the disclosure.
  • aspects of the embodiments disclosed herein relate to a method and apparatus for attempted secure print job release notification from an image production device.
  • the disclosed embodiments may include a method for notifying a user of an attempted secure print job release from an image production device.
  • the method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
  • the disclosed embodiments may further include an image production device that may include a memory, and a secure print manager that receives a secure print job and secure print job instructions from a user and stores the secure print job in the memory, wherein the secure print job instructions include at least a pass code and the user's contact information, determines if a pass code has been entered for the user's secure print job, wherein if the secure print manager determines that a pass code has been entered for the user's secure print job, the secure print manager determines if the entered pass code is correct, wherein if the secure print manager determines that the entered pass code is correct, the secure print manager sends a signal to print the secure print job and notifies the user in accordance with the user's contact information that the secure print job has been printed, otherwise, the secure print manager notifies the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
  • an image production device may include a memory, and a secure print manager that receives a secure print job and secure print
  • the disclosed embodiments may further include a method for notifying a user of an attempted secure print job release from an image production device.
  • the method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, receiving identification information of an image production device operator, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, retrieving the user's stored profile, determining if the image production device operator is identified as an authorized user in the user's profile, wherein if it is determined that the image production device operator is identified as an authorized user, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information
  • the disclosed embodiments may concern adding an option to allow a user to receive an alert notification if their remote secure print job, which requires a local pass code on an image production device to be released, has been attempted to be and/or has been released.
  • the notification can be via e-mail, telephone, text message, instant message, web site, personal computer alert, pager, etc.
  • This function may be used in conjunction with other secure print job security functions including a function which may allow the authorized user to select a time period (for example 1 hour) after which their secure print job may be automatically deleted by the local device if it has not been released/deleted by an authorized user.
  • This function may be accomplished via extending the functionality of the current secure print driver dialog box (refer to example dialog box on next page). The user may have the option to vary the time for each individual secure print job.
  • FIG. 1 is an exemplary diagram of an image production environment 100 in accordance with one possible embodiment of the disclosure.
  • the image production environment 100 may include a processing device 110 that may be hardwired or wirelessly connected to an image production device 120 .
  • the processing device 110 may be any device capable to sending a print job to an image production device 120 , including a computer, a server, a telephone, or a personal digital assistant, for example.
  • the image production device 120 may be any device that may be capable of printing documents, including a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, or a multi-function device, for example.
  • FIG. 2 is an exemplary block diagram of an image production device 120 in accordance with one possible embodiment of the disclosure.
  • the image production device 120 may include a bus 210 , a processor 220 , a memory 230 , a read only memory (ROM 240 , a secure print manager 250 , an output section 260 , a user interface 270 , a communication interface 280 , and an image production section 290 .
  • Bus 210 may permit communication among the components of the image production device 120 .
  • Processor 220 may include at least one conventional processor or microprocessor that interprets and executes instructions.
  • Memory 230 may be a random access memory (RAM) or another type of dynamic storage device that stores information and instructions for execution by processor 220 .
  • Memory 230 may also include a read-only memory (ROM) which may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220 .
  • ROM read-only memory
  • Communication interface 280 may include any mechanism that facilitates communication via a network.
  • communication interface 280 may include a modem.
  • communication interface 280 may include other mechanisms for assisting in communications with other devices and/or systems.
  • ROM 240 may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220 .
  • a storage device may augment the ROM and may include any type of storage media, such as, for example, magnetic or optical recording media and its corresponding drive.
  • User interface 270 may include one or more conventional mechanisms that permit a user to input information to and interact with the image production unit 100 , such as a keyboard, a display, a mouse, a pen, a voice recognition device, touchpad, buttons, etc., for example.
  • Output section 260 may include one or more conventional mechanisms that output image production documents to the user, including output trays, output paths, finishing section, etc., for example.
  • the image production section 290 may include an image printing section, a scanner, a fuser section, a toner section, etc., for example.
  • the image production device 120 may perform such functions in response to processor 220 by executing sequences of instructions contained in a computer-readable medium, such as, for example, memory 230 . Such instructions may be read into memory 230 from another computer-readable medium, such as a storage device or from a separate device via communication interface 280 .
  • the image production device 120 illustrated in FIGS. 1-2 and the related discussion are intended to provide a brief, general description of a suitable communication and processing environment in which the disclosure may be implemented. Although not required, the disclosure will be described, at least in part, in the general context of computer-executable instructions, such as program modules, being executed by the image production device 120 , such as a communication server, communications switch, communications router, or general purpose computer, for example.
  • computer-executable instructions such as program modules
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • FIG. 3 For illustrative purposes, the operation of the secure print manager 250 and the exemplary attempted secure print job release notification process are described in FIG. 3 in relation to the block diagrams shown in FIGS. 1-2 .
  • FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure.
  • the process may begin at step 3100 , and continues to step 3200 where the secure print manager 250 may receive a secure print job and secure print job instructions from a user and may store the secure print job in the memory 230 .
  • the secure print job instructions may include a pass code and the user's contact information, for example.
  • the secure print manager 250 may determine if a pass code has been entered for the user's secure print job. If the secure print manager 250 determines that a pass code has not been entered for the user's secure print job, the process returns to step 3300 , and waits.
  • the secure print manager 250 may determine if the entered pass code is correct. If the secure print manager 250 determines that the entered pass code is not correct, then at step 3500 , the secure print manager may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job. In this manner, the secure print manager 250 may notify the user of at least one of the identity of the unauthorized user, the time and date of the unauthorized user attempt, and the location of the unauthorized user attempt, for example. In addition, after one or more unauthorized user attempts to print the secure print job, the secure print manager 250 may delete the secure print job automatically or lock the secure print job for a predetermined time period. The process may then return to step 3300 .
  • the secure print manager 250 may send a signal to print the secure print job.
  • the secure print manager 250 may notify the user in accordance with the user's contact information that the secure print job has been printed. The process may then go to step 3800 , and end.
  • FIGS. 4A and 4B are diagrams of exemplary secure print job user interface screens in accordance with one possible embodiment of the disclosure.
  • the secure print job user interfaces 400 , 440 may be presented using a processing device 110 , such as computer, a server, a telephone, or a personal digital assistant, for example, and may include areas where the user can enter secure print job instructions.
  • the secure print job user interface 400 may include secure print job instructions such as an area that prompts the user to enter (and confirm) a pass code 410 , and a notification option 420 that prompts the user to select an option to be notified if an unauthorized user attempts to release the secure print job.
  • secure print job instructions such as an area that prompts the user to enter (and confirm) a pass code 410
  • notification option 420 that prompts the user to select an option to be notified if an unauthorized user attempts to release the secure print job.
  • another user interface 440 may pop-up to enter in the appropriate the user's contact information 450 , for example.
  • the user's contact information 450 may include a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, or an instant messenger address, for example.
  • the user's contact information may also be pre-stored in memory 230 as part of a user profile and may be presented for verification purposes, for example.
  • the secure print manager 250 may prompt the user at the user interface 270 to enter the pass code 410 that the user previously entered using the secure print job user interface 400 and may determine if the pass code is correct. If the secure print manager 250 determines that the pass code is correct, the secure print manager 250 may enable the secure print job to be printed.
  • the secure print job may also be released by an authorized person other than the user.
  • the secure print manager 250 may receive identification information of an image production device operator.
  • the secure print manager 250 may receive the pass code, retrieve the user's stored profile and determine if the image production device operator is identified as an authorized user in the user's profile. If the secure print manager 250 determines that the image production device operator is identified as an authorized user, the secure print manager 250 may send a signal to the print the secure print job and notify the user in accordance with the user's contact information that the secure print job has been printed. If the secure print manager 250 determines that the image production device operator is not identified as an authorized user, the secure print manager 250 may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
  • the secure print manager 250 may store information concerning the secure print job in the memory 230 .
  • This information may includes the identity of an operator of attempting to release the secure print job from an image production device 120 , the time and date of the operator's attempt, and the location of the operator's attempt.
  • the identity of the operator may be established by an identification code, key card, etc., for example.
  • the secure print manager 250 may delete the secure print job if the image production device 120 is moved or replaced, for example.
  • the secure print manager 250 may determine if the image production device 120 has been moved if it detects that the image production device 120 has acquires a new internet protocol (IP) address (e.g., by comparison to a previous stored IP address) or through the use of sensors, a global positioning system (GPS) device, etc., for example.
  • IP internet protocol
  • GPS global positioning system
  • the user interface 400 may include other options (not shown) including an amount of time that must expire 420 before the image production device 120 deletes the secure print job, for example. If the user does not enter a secure print job expiration time 420 , the secure print manager 250 may set a default secure print job expiration time, chosen by either of an administrator or the manufacturer, for example. In this manner, the secure print manager 250 may delete the secure print job upon expiration of the default secure print job expiration time.
  • the secure print manager 250 may send various notifications to the user concerning a secure print job, including that the secure print job that the secure print job has been deleted, for example.
  • the processing device 110 may also receive a request from the user to modify the secure print job instructions. In this manner, the processing device 110 may prompt the user to enter the pass code 410 previously entered at the secure print job user interface 400 . If the pass code is entered correctly, the processing device 110 may prompt the user to modify the secure print job instructions. Once the secure print job instructions are modified, they may be sent to the image production device 120 .
  • Embodiments as disclosed herein may also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon.
  • Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
  • Such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures.
  • a network or another communications connection either hard wired, wireless, or combination thereof
  • any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
  • Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
  • Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments.
  • program modules include routines, programs, objects, components, and data structures, and the like that perform particular tasks or implement particular abstract data types.
  • Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described therein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Facsimiles In General (AREA)

Abstract

A method and apparatus for notifying a user of an attempted secure print job release from an image production device is disclosed. The method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.

Description

PRIORITY INFORMATION
This application claims priority as a continuation-in-part of co-pending U.S. patent application Ser. No. 12/168,998, filed Jul. 7, 2008, the contents of which are incorporated herein by reference.
BACKGROUND
Disclosed herein are a method and apparatus for attempted secure print job release notification from an image production device.
Most current printers and multifunctional devices support a secure print feature. The secure print feature may allow users to protect a confidential document that they may not want others to view or take, by requiring the user to be at the image production device when the print job prints out. In most cases, the user selects this function, and then walks to the device to release the job. However, some users may leave the print job on the device for an extended period of time (e.g., forget about the print job, send it to the wrong printer, etc.).
In conventional devices, the print job will stay resident on the image production device until it is either released or deleted by the authorized user at the image production device user interface or manually deleted by a system administrator. The issue with this implementation is that the user does not control or receive any notification of any attempts to release or delete their secure print job(s) while he or she is not present at the image production device. This issue may pose a security risk depending upon the security policies of the organization.
SUMMARY
A method and apparatus for notifying a user of an attempted secure print job release from an image production device is disclosed. The method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an exemplary diagram of an image production environment in accordance with one possible embodiment of the disclosure;
FIG. 2 is an exemplary block diagram of an image production device in accordance with one possible embodiment of the disclosure;
FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure; and
FIGS. 4A and 4B are diagrams of exemplary secure print job user interfaces in accordance with one possible embodiment of the disclosure.
DETAILED DESCRIPTION
Aspects of the embodiments disclosed herein relate to a method and apparatus for attempted secure print job release notification from an image production device.
The disclosed embodiments may include a method for notifying a user of an attempted secure print job release from an image production device. The method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
The disclosed embodiments may further include an image production device that may include a memory, and a secure print manager that receives a secure print job and secure print job instructions from a user and stores the secure print job in the memory, wherein the secure print job instructions include at least a pass code and the user's contact information, determines if a pass code has been entered for the user's secure print job, wherein if the secure print manager determines that a pass code has been entered for the user's secure print job, the secure print manager determines if the entered pass code is correct, wherein if the secure print manager determines that the entered pass code is correct, the secure print manager sends a signal to print the secure print job and notifies the user in accordance with the user's contact information that the secure print job has been printed, otherwise, the secure print manager notifies the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
The disclosed embodiments may further include a method for notifying a user of an attempted secure print job release from an image production device. The method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, receiving identification information of an image production device operator, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, retrieving the user's stored profile, determining if the image production device operator is identified as an authorized user in the user's profile, wherein if it is determined that the image production device operator is identified as an authorized user, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
Most conventional printers, multifunctional devices, etc, support the feature of holding remote secure print jobs until a pass code is input at the local user interface to release the secure print job. However, there is currently no feedback to the secure print job user if an unauthorized user attempts to release their secure print job. This lack of feedback may be a security risk, depending upon the nature of the job attempting to be released, or the location of the device (e.g. Government account, financial institution, etc.).
The disclosed embodiments may concern adding an option to allow a user to receive an alert notification if their remote secure print job, which requires a local pass code on an image production device to be released, has been attempted to be and/or has been released. The notification can be via e-mail, telephone, text message, instant message, web site, personal computer alert, pager, etc.
This function may be used in conjunction with other secure print job security functions including a function which may allow the authorized user to select a time period (for example 1 hour) after which their secure print job may be automatically deleted by the local device if it has not been released/deleted by an authorized user. This function may be accomplished via extending the functionality of the current secure print driver dialog box (refer to example dialog box on next page). The user may have the option to vary the time for each individual secure print job. There may also be a configuration setting available to allow the system administrator to set the duration for how long any secure print job will be held until it is automatically deleted.
FIG. 1 is an exemplary diagram of an image production environment 100 in accordance with one possible embodiment of the disclosure. The image production environment 100 may include a processing device 110 that may be hardwired or wirelessly connected to an image production device 120.
The processing device 110 may be any device capable to sending a print job to an image production device 120, including a computer, a server, a telephone, or a personal digital assistant, for example. The image production device 120 may be any device that may be capable of printing documents, including a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, or a multi-function device, for example.
FIG. 2 is an exemplary block diagram of an image production device 120 in accordance with one possible embodiment of the disclosure. The image production device 120 may include a bus 210, a processor 220, a memory 230, a read only memory (ROM 240, a secure print manager 250, an output section 260, a user interface 270, a communication interface 280, and an image production section 290. Bus 210 may permit communication among the components of the image production device 120.
Processor 220 may include at least one conventional processor or microprocessor that interprets and executes instructions. Memory 230 may be a random access memory (RAM) or another type of dynamic storage device that stores information and instructions for execution by processor 220. Memory 230 may also include a read-only memory (ROM) which may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220.
Communication interface 280 may include any mechanism that facilitates communication via a network. For example, communication interface 280 may include a modem. Alternatively, communication interface 280 may include other mechanisms for assisting in communications with other devices and/or systems.
ROM 240 may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220. A storage device may augment the ROM and may include any type of storage media, such as, for example, magnetic or optical recording media and its corresponding drive.
User interface 270 may include one or more conventional mechanisms that permit a user to input information to and interact with the image production unit 100, such as a keyboard, a display, a mouse, a pen, a voice recognition device, touchpad, buttons, etc., for example. Output section 260 may include one or more conventional mechanisms that output image production documents to the user, including output trays, output paths, finishing section, etc., for example. The image production section 290 may include an image printing section, a scanner, a fuser section, a toner section, etc., for example.
The image production device 120 may perform such functions in response to processor 220 by executing sequences of instructions contained in a computer-readable medium, such as, for example, memory 230. Such instructions may be read into memory 230 from another computer-readable medium, such as a storage device or from a separate device via communication interface 280.
The image production device 120 illustrated in FIGS. 1-2 and the related discussion are intended to provide a brief, general description of a suitable communication and processing environment in which the disclosure may be implemented. Although not required, the disclosure will be described, at least in part, in the general context of computer-executable instructions, such as program modules, being executed by the image production device 120, such as a communication server, communications switch, communications router, or general purpose computer, for example.
Generally, program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that other embodiments of the disclosure may be practiced in communication network environments with many types of communication equipment and computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, and the like.
For illustrative purposes, the operation of the secure print manager 250 and the exemplary attempted secure print job release notification process are described in FIG. 3 in relation to the block diagrams shown in FIGS. 1-2.
FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure. The process may begin at step 3100, and continues to step 3200 where the secure print manager 250 may receive a secure print job and secure print job instructions from a user and may store the secure print job in the memory 230. The secure print job instructions may include a pass code and the user's contact information, for example.
At step 3300, the secure print manager 250 may determine if a pass code has been entered for the user's secure print job. If the secure print manager 250 determines that a pass code has not been entered for the user's secure print job, the process returns to step 3300, and waits.
If at step 3300, the secure print manager 250 determines that a pass code has been entered for the user's secure print job, at step 3400, the secure print manager 250 may determine if the entered pass code is correct. If the secure print manager 250 determines that the entered pass code is not correct, then at step 3500, the secure print manager may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job. In this manner, the secure print manager 250 may notify the user of at least one of the identity of the unauthorized user, the time and date of the unauthorized user attempt, and the location of the unauthorized user attempt, for example. In addition, after one or more unauthorized user attempts to print the secure print job, the secure print manager 250 may delete the secure print job automatically or lock the secure print job for a predetermined time period. The process may then return to step 3300.
If at step 3400, the secure print manager 250 determines that the pass code is correct, then at step 3600 the secure print manager may send a signal to print the secure print job. The secure print manager 250 may notify the user in accordance with the user's contact information that the secure print job has been printed. The process may then go to step 3800, and end.
FIGS. 4A and 4B are diagrams of exemplary secure print job user interface screens in accordance with one possible embodiment of the disclosure. The secure print job user interfaces 400, 440 may be presented using a processing device 110, such as computer, a server, a telephone, or a personal digital assistant, for example, and may include areas where the user can enter secure print job instructions.
In particular, in FIG. 4A, the secure print job user interface 400 may include secure print job instructions such as an area that prompts the user to enter (and confirm) a pass code 410, and a notification option 420 that prompts the user to select an option to be notified if an unauthorized user attempts to release the secure print job. Once the notification option 420 is selected, the notification method 430 may be selected.
Once the notification method 430 is selected, another user interface 440 may pop-up to enter in the appropriate the user's contact information 450, for example. The user's contact information 450 may include a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, or an instant messenger address, for example. The user's contact information may also be pre-stored in memory 230 as part of a user profile and may be presented for verification purposes, for example.
At the image production device 120, the secure print manager 250 may prompt the user at the user interface 270 to enter the pass code 410 that the user previously entered using the secure print job user interface 400 and may determine if the pass code is correct. If the secure print manager 250 determines that the pass code is correct, the secure print manager 250 may enable the secure print job to be printed.
The secure print job may also be released by an authorized person other than the user. For example, the secure print manager 250 may receive identification information of an image production device operator. The secure print manager 250 may receive the pass code, retrieve the user's stored profile and determine if the image production device operator is identified as an authorized user in the user's profile. If the secure print manager 250 determines that the image production device operator is identified as an authorized user, the secure print manager 250 may send a signal to the print the secure print job and notify the user in accordance with the user's contact information that the secure print job has been printed. If the secure print manager 250 determines that the image production device operator is not identified as an authorized user, the secure print manager 250 may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
In this manner, the secure print manager 250 may store information concerning the secure print job in the memory 230. This information may includes the identity of an operator of attempting to release the secure print job from an image production device 120, the time and date of the operator's attempt, and the location of the operator's attempt. The identity of the operator may be established by an identification code, key card, etc., for example.
As an added security measure, the secure print manager 250 may delete the secure print job if the image production device 120 is moved or replaced, for example. The secure print manager 250 may determine if the image production device 120 has been moved if it detects that the image production device 120 has acquires a new internet protocol (IP) address (e.g., by comparison to a previous stored IP address) or through the use of sensors, a global positioning system (GPS) device, etc., for example.
The user interface 400 may include other options (not shown) including an amount of time that must expire 420 before the image production device 120 deletes the secure print job, for example. If the user does not enter a secure print job expiration time 420, the secure print manager 250 may set a default secure print job expiration time, chosen by either of an administrator or the manufacturer, for example. In this manner, the secure print manager 250 may delete the secure print job upon expiration of the default secure print job expiration time.
The secure print manager 250 may send various notifications to the user concerning a secure print job, including that the secure print job that the secure print job has been deleted, for example.
The processing device 110 may also receive a request from the user to modify the secure print job instructions. In this manner, the processing device 110 may prompt the user to enter the pass code 410 previously entered at the secure print job user interface 400. If the pass code is entered correctly, the processing device 110 may prompt the user to modify the secure print job instructions. Once the secure print job instructions are modified, they may be sent to the image production device 120.
Embodiments as disclosed herein may also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures. When information is transferred or provided over a network or another communications connection (either hard wired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, objects, components, and data structures, and the like that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described therein. It will be appreciated that various of the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Also that various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.

Claims (21)

1. A method for notifying a user of an attempted secure print job release from an image production device, comprising:
receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and contact information of the user;
determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job,
determining if the entered pass code is correct,
wherein if it is determined that the entered pass code is correct,
sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise,
notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job;
notifying the user of an identity of the unauthorized user, a time and date of the unauthorized user attempt, and a location of the unauthorized user attempt,
deleting the secure print job if the image production device acquires a new internet protocol address; and
notifying the user if the secure print job is deleted.
2. The method of claim 1, wherein the user's contact information is at least one of a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, and an instant messenger address.
3. The method of claim 1, wherein the secure print job may be released by an authorized person other than the user.
4. The method of claim 1, further comprising:
storing information concerning the secure print job that includes at least one of an identity of an operator that attempts to release the secure print job from an image production device, a time and date of the operator's attempt, and a location of the operator's attempt.
5. The method of claim 1, wherein after one or more unauthorized user attempts to print the secure print job, the secure print job is automatically deleted.
6. The method of claim 1, wherein after one or more unauthorized user attempts to print the secure print job, the secure print job is locked for a predetermined time period.
7. The method of claim 1, wherein the image production device is one of a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, and a multi-function device.
8. An image production device, comprising:
a memory; and
a secure print manager that receives a secure print job and secure print job instructions from a user and stores the secure print job in the memory, wherein the secure print job instructions include at least a pass code and contact information of the user, determines if a pass code has been entered for the user's secure print job, wherein if the secure print manager determines that a pass code has been entered for the user's secure print job, the secure print manager determines if the entered pass code is correct, wherein if the secure print manager determines that the entered pass code is correct, the secure print manager sends a signal to print the secure print job and notifies the user in accordance with the user's contact information that the secure print job has been printed, otherwise, the secure print manager notifies the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job,
wherein the secure print job manager notifies the user of an identity of the unauthorized user, a time and date of the unauthorized user attempt, and a location of the unauthorized user attempt,
wherein the secure print job manager deletes the secure print job and notifies the user that the secure print job is deleted if the image production device acquires a new internet protocol address.
9. The image production device of claim 8, wherein the user's contact information is at least one of a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, and an instant messenger address.
10. The image production device of claim 8, wherein the secure print job may be released by an authorized person other than the user.
11. The image production device of claim 8, wherein the secure print manager stores information concerning the secure print job in the memory that includes at least one of an identity of an operator that attempts to release the secure print job from an image production device, a time and date of the operator's attempt, and a location of the operator's attempt.
12. The image production device of claim 8, wherein after one or more unauthorized user attempts to print the secure print job, the secure print manager automatically deletes the secure print job.
13. The image production device of claim 8, wherein after one or more unauthorized user attempts to print the secure print job, the secure print manager locks the secure print job for a predetermined time period.
14. The image production device of claim 8, wherein the image production device is one of a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, and a multi-function device.
15. A method for notifying a user of an attempted secure print job release from an image production device, comprising:
receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and contact information of the user;
receiving identification information of an image production device operator;
determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job,
determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct,
retrieving the user's stored profile;
determining if the image production device operator is identified as an authorized user in the user's profile, wherein if it is determined that the image production device operator is identified as an authorized user,
sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise,
notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job;
notifying the user of an identity of the unauthorized user, a time and date of the unauthorized user attempt, and a location of the unauthorized user attempt,
deleting the secure print job if the image production device acquires a new internet protocol address, and
notifying the user if the secure print job is deleted.
16. The method of claim 15, wherein the user's contact information is at least one of a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, and an instant messenger address.
17. The method of claim 15, wherein the secure print job may be released by an authorized person other than the user.
18. The method of claim 15, further comprising:
storing information concerning the secure print job that includes at least one of an identity of an operator that attempts to release the secure print job from an image production device, a time and date of the operator's attempt, and a location of the operator's attempt.
19. The method of claim 15, wherein after one or more unauthorized user attempts to print the secure print job, the secure print job is automatically deleted.
20. The method of claim 15, wherein after one or more unauthorized user attempts to print the secure print job, the secure print job is locked for a predetermined time period.
21. The method of claim 15, wherein the image production device is one of a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, and a multi-function device.
US12/207,090 2008-07-08 2008-09-09 Method and apparatus for attempted secure print job release notification Expired - Fee Related US8169633B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/207,090 US8169633B2 (en) 2008-07-08 2008-09-09 Method and apparatus for attempted secure print job release notification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/168,998 US20100007909A1 (en) 2008-07-08 2008-07-08 Method and apparatus for deleting secure print jobs
US12/207,090 US8169633B2 (en) 2008-07-08 2008-09-09 Method and apparatus for attempted secure print job release notification

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/168,998 Continuation-In-Part US20100007909A1 (en) 2008-07-08 2008-07-08 Method and apparatus for deleting secure print jobs

Publications (2)

Publication Number Publication Date
US20100007907A1 US20100007907A1 (en) 2010-01-14
US8169633B2 true US8169633B2 (en) 2012-05-01

Family

ID=41504878

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/207,090 Expired - Fee Related US8169633B2 (en) 2008-07-08 2008-09-09 Method and apparatus for attempted secure print job release notification

Country Status (1)

Country Link
US (1) US8169633B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8665463B2 (en) 2011-02-28 2014-03-04 Xerox Corporation Sharing common printing passwords among multiple printing devices connected to network
US9361053B2 (en) 2013-01-31 2016-06-07 Hewlett-Packard Development Company, L.P. Confidential-sender email addresses for printing
US9832034B2 (en) 2011-07-27 2017-11-28 Honeywell International Inc. Systems and methods for managing a programmable thermostat
US9858516B2 (en) 2013-03-07 2018-01-02 Hewlett-Packard Development Company, L.P. Secure printing
US10579313B1 (en) 2019-03-26 2020-03-03 Zerox Corporation Method and apparatus for releasing a secure print job between users

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380889B2 (en) 2010-03-31 2013-02-19 Oki Data Americas, Inc. Distributed peripheral device management system
KR101851658B1 (en) * 2011-08-18 2018-04-25 에스프린팅솔루션 주식회사 Image forming device and information management method of the image forming device
US9235722B2 (en) 2012-04-27 2016-01-12 Hewlett-Packard Development Company, L.P.L Document security
JP5766665B2 (en) * 2012-08-01 2015-08-19 株式会社沖データ Image processing apparatus, print job management method, and image forming system
JP6852466B2 (en) * 2017-03-03 2021-03-31 コニカミノルタ株式会社 Image-forming equipment, printing systems, and computer-based methods of image forming equipment
JP2023122804A (en) * 2022-02-24 2023-09-05 キヤノン株式会社 Image formation device, control method of image formation device, and program
US20240247421A1 (en) * 2023-01-24 2024-07-25 Haier Us Appliance Solutions, Inc. Domestic appliances and methods of automatic calibration

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065729A1 (en) * 2000-11-30 2002-05-30 Guillemin Gustavo M. Systems and methods for secure printing
US20020104026A1 (en) * 2001-01-29 2002-08-01 Robert Barra Method and apparatus for providing a service to transfer messages over a communications network
US6567180B1 (en) * 1998-05-29 2003-05-20 Hitachi Koki Co., Ltd. Document printing method
US20030227647A1 (en) * 2002-06-05 2003-12-11 Microsoft Corporation System and method for managing printed documents
US6819445B1 (en) 2000-01-25 2004-11-16 Xerox Corporation Digital printing system which retains recent files for rapid output
US20040246513A1 (en) * 2003-06-03 2004-12-09 Hewlett-Packard Company Method and apparatus for crash recovery on an image forming apparatus
US20050275866A1 (en) * 2004-05-26 2005-12-15 Dylan Corlett Methods and apparatus for secure printing
US20060072149A1 (en) * 2004-08-03 2006-04-06 Jim Justice Universal document exchange system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6567180B1 (en) * 1998-05-29 2003-05-20 Hitachi Koki Co., Ltd. Document printing method
US6819445B1 (en) 2000-01-25 2004-11-16 Xerox Corporation Digital printing system which retains recent files for rapid output
US20020065729A1 (en) * 2000-11-30 2002-05-30 Guillemin Gustavo M. Systems and methods for secure printing
US20020104026A1 (en) * 2001-01-29 2002-08-01 Robert Barra Method and apparatus for providing a service to transfer messages over a communications network
US20030227647A1 (en) * 2002-06-05 2003-12-11 Microsoft Corporation System and method for managing printed documents
US20040246513A1 (en) * 2003-06-03 2004-12-09 Hewlett-Packard Company Method and apparatus for crash recovery on an image forming apparatus
US20050275866A1 (en) * 2004-05-26 2005-12-15 Dylan Corlett Methods and apparatus for secure printing
US20060072149A1 (en) * 2004-08-03 2006-04-06 Jim Justice Universal document exchange system and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8665463B2 (en) 2011-02-28 2014-03-04 Xerox Corporation Sharing common printing passwords among multiple printing devices connected to network
US9832034B2 (en) 2011-07-27 2017-11-28 Honeywell International Inc. Systems and methods for managing a programmable thermostat
US10454702B2 (en) 2011-07-27 2019-10-22 Ademco Inc. Systems and methods for managing a programmable thermostat
US9361053B2 (en) 2013-01-31 2016-06-07 Hewlett-Packard Development Company, L.P. Confidential-sender email addresses for printing
US9858516B2 (en) 2013-03-07 2018-01-02 Hewlett-Packard Development Company, L.P. Secure printing
US10579313B1 (en) 2019-03-26 2020-03-03 Zerox Corporation Method and apparatus for releasing a secure print job between users

Also Published As

Publication number Publication date
US20100007907A1 (en) 2010-01-14

Similar Documents

Publication Publication Date Title
US8169633B2 (en) Method and apparatus for attempted secure print job release notification
KR101424851B1 (en) Image processing apparatus, method of controlling the same, and storage medium
US10136029B2 (en) Printing apparatus, printing apparatus control method, and program
US20100007909A1 (en) Method and apparatus for deleting secure print jobs
US7551319B2 (en) Printer device, printing method, printing program, and recording medium
US9075550B2 (en) Printing apparatus, printing method, and storage medium
US8223354B2 (en) Printing apparatus capable of performing confidential printing and printing method for use therein
US8294550B2 (en) Authentication system, authentication method, and information processing apparatus
US8797573B2 (en) Image forming apparatus, print data processing method thereof, and recording medium
JP4274206B2 (en) Job processing system, job processing apparatus, job specifying method, and job specifying processing program
US20080007780A1 (en) Printing system, printing control method, and computer readable medium
JP5145254B2 (en) Image forming system, server apparatus, and image forming apparatus
KR20130031208A (en) Printing control apparatus and control method therefor
JP4710714B2 (en) Printing system, printing method, program, and printing apparatus
JP4628310B2 (en) Print control apparatus, print control system, print control method, and program
JP2005328322A (en) Image output device
US20150242170A1 (en) Image forming apparatus, job execution system, and job execution method
US10649703B2 (en) Print control apparatus, control method of a print control apparatus, and recording medium
JP4665950B2 (en) Network printer
US20060064738A1 (en) Device usage information writing apparatus and method thereof, image forming apparatus and device system having the apparatus
JP5097749B2 (en) Image forming system and server device
JP2010170235A (en) Image forming system and server device
JP4810849B2 (en) Document management method, document management program, document management apparatus, and document management system
JP2006094067A (en) Image processor and image processing system
JP6340820B2 (en) Information processing system, information processing method, and program

Legal Events

Date Code Title Description
AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AIKENS, ANDREW J.;HUANG, ZHUN;REEL/FRAME:021501/0459;SIGNING DATES FROM 20080908 TO 20080909

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AIKENS, ANDREW J.;HUANG, ZHUN;SIGNING DATES FROM 20080908 TO 20080909;REEL/FRAME:021501/0459

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ZAAA Notice of allowance and fees due

Free format text: ORIGINAL CODE: NOA

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: CITIBANK, N.A., AS AGENT, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:062740/0214

Effective date: 20221107

AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT R/F 062740/0214;ASSIGNOR:CITIBANK, N.A., AS AGENT;REEL/FRAME:063694/0122

Effective date: 20230517

AS Assignment

Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:064760/0389

Effective date: 20230621

AS Assignment

Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:065628/0019

Effective date: 20231117

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT RF 064760/0389;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:068261/0001

Effective date: 20240206

Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:066741/0001

Effective date: 20240206

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20240501